Year: 2009

  • China's New Mandatory Censorware Creates Big Security Flaws

    Today Scott Wolchok, Randy Yao, and Alex Halderman at the University of Michigan released a report analyzing Green Dam, the censorware program that the Chinese government just ordered installed on all new computers in China. The researchers found that Green Dam creates very serious security vulnerabilities on users’ computers. The report starts with a summary…

  • On China's new, mandatory censorship software

    The New York Times reports that China will start requiring censorship software on PCs. One interesting quote stands out: Zhang Chenming, general manager of Jinhui Computer System Engineering, a company that helped create Green Dam, said worries that the software could be used to censor a broad range of content or monitor Internet use were…

  • Internet Voting: How Far Can We Go Safely?

    Yesterday I chaired an interesting panel on Internet Voting at CFP. Participants included Amy Bjelland and Craig Stender (State of Arizona), Susan Dzieduszycka-Suinat (Overseas Vote Foundation) Avi Rubin (Johns Hopkins), and Alec Yasinsac (Univ. of South Alabama). Thanks to David Bruggeman and Cameron Wilson at USACM for setting up the panel. Nobody advocated a full-on…

  • Photo censorship vs. digital photography

    On the 20th anniversary of the Tiananmen Square events (protests? uprising? insurrection? massacre?), the New York Times’ Lens Blog put up a great piece about the four different photographers who photographed the iconic “Tank Man”. Inevitably, half of the story concerns the technical details of being in the right place and having the right equipment…

  • iPhone Apps: Apple Picks a Little, Talks a Little

    Last week Apple, in an incident destined for the textbooks, rejected an iPhone app called Eucalyptus, which lets you download and read classic public-domain books from Project Gutenberg. The rejection meant that nobody could download or use the app (without jailbreaking their phone). Apple’s rationale? Some of the books, in Apple’s view, were inappropriate. Apple’s…

  • NJ Voting-machine Trial: Defense Witnesses

    I’ve previously summarized my own testimony and other plaintiffs’ witnesses’ testimony in the New Jersey voting machines trial, Gusciora v. Corzine. The defendant is the State of New Jersey (Governor and Secretary of State). The defense case comprised the following witnesses: Defense witness James Clayton, the Ocean County voting machine warehouse supervisor, is a well-intentioned…

  • NJ Voting-machine trial: Plaintiffs' witnesses

    Both sides in the NJ voting-machines lawsuit, Gusciora v. Corzine, have finished presenting their witnesses. Briefs (in which each side presents proposed conclusions) are due June 15 (plaintiffs) and July 15 (defendants), then the Court will eventually issue a decision. In summary, the plaintiffs argue that New Jersey’s voting machines (Sequoia AVC Advantage) can’t be…

  • European Antitrust Fines Against Intel: Possibly Justified

    Last week the European Commission competition authorities charged Intel with anticompetitive behavior in the market for microprocessor chips, and levied a €1.06 billion ($1.45 billion) fine on the company. Some commentators attacked the ruling as ridiculous on its face. I disagree. Let me explain why the European action, though not conclusively justified at this point,…

  • The future of high school yearbooks

    The Dallas Morning News recently ran a piece about how kids these days aren’t interested in buying physical, printed yearbooks. (Hat tip to my high school’s journalism teacher, who linked to it from our journalism alumni Facebook group.) Why spend $60 on a dead-trees yearbook when you can get everything you need on Facebook? My…

  • Sizing Up "Code" with 20/20 Hindsight

    Code and Other Laws of Cyberspace, Larry Lessig’s seminal work on Internet regulation, turns ten years old this year. To mark the occassion, the online magazine Cato Unbound (full disclosure: I’m a Cato adjunct scholar) invited Lessig and three other prominent Internet scholars to weigh in on Code’s legacy: what it got right, where it…